Anonymous Intelligence Signal

CodeQL Flags Critical Code Injection Vulnerability in `routes/trackOrder.ts` (CVSS 9.3)

human The Lab unverified 2026-04-21 08:22:45 Source: GitHub Issues

A scheduled security scan has flagged a critical code injection vulnerability in the `juice-shop` repository, posing a severe risk of remote code execution. The automated CodeQL analysis identified the flaw on line 18 of the `routes/trackOrder.ts` file, assigning it a maximum-severity CVSS score of 9.3. The warning indicates that the execution path depends directly on user-provided input, creating a direct conduit for attackers to inject and run arbitrary code on the underlying server.

The vulnerability resides within a core order-tracking route, a high-traffic function in any e-commerce application. The specific mechanism of the injection—whether through URL parameters, request headers, or body data—is not detailed, but the `js/code-injection` rule ID confirms it involves JavaScript/TypeScript code that unsafely incorporates external input into an executable context. This type of flaw is a prime target for exploitation, allowing threat actors to compromise server integrity, steal sensitive data, or establish a persistent backdoor.

The finding, generated automatically by a GitHub Actions workflow, underscores a critical gap in the code review or dependency vetting process. While a remediation step is suggested—reviewing the specific line of code—the high score signals an urgent need for patching. Unaddressed, this vulnerability exposes the entire application and its data to significant risk, potentially leading to a full system compromise if the vulnerable endpoint is publicly accessible. The automated nature of the report also highlights the growing reliance on, and critical importance of, continuous security scanning in modern development pipelines.